Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and machine learning capabilities. Designed for cybersecurity professionals, ethical hackers, and penetration testers,
☆50Aug 9, 2025Updated 7 months ago
Alternatives and similar repositories for metasploit-ai
Users that are interested in metasploit-ai are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- Modern cybersecurity tools platform built with React and TypeScript. This provides a collection of essential security tools with a sleek,…☆24Jul 19, 2025Updated 8 months ago
- a script for Kali Linux☆10Jun 28, 2013Updated 12 years ago
- Bug Bounty Setup Tools On Fresh VPS. This scripts automatically installs top bug bounty tools and set up environment in newly installed …☆31Jan 27, 2026Updated 2 months ago
- NMAP-AI: AI-Powered Network Scanning & Automation Platform 🤖 Revolutionizing network scanning with AI-powered automation, intelli…☆90Feb 14, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- The Metasploit-Termux-Installer script automates the setup of Metasploit Framework on Termux, enabling penetration testing on Android. It…☆18Feb 27, 2025Updated last year
- Lightweight BApp that seamlessly integrates powerful LLM-scanning capabilities into Burp's built-in Scanner with improved accuracy. Suppo…☆37Aug 4, 2025Updated 7 months ago
- MCP server for the Delinea Secret Server and Platform APIs☆45Updated this week
- Kalshi Advanced Quantitative Trading Bot is an enterprise-grade automated trading system designed for the Kalshi event-based prediction m…☆32Jan 9, 2026Updated 2 months ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆33Jul 31, 2025Updated 7 months ago
- JSON2YAML is a Python-based utility that simplifies the process of converting CVE (Common Vulnerabilities and Exposures) data from JSON f…☆12Feb 10, 2025Updated last year
- ☆29Feb 9, 2026Updated last month
- Deep Learning AI Bots that trade the forex market☆13Jul 14, 2018Updated 7 years ago
- Anomaly detection system for heart diseases from ECG using machine learning☆12Feb 15, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- CTI Cyber Threat Intelligence OSINT Dark Web Deep Web Research. Ransomware gang information gathering tool.☆142Dec 19, 2025Updated 3 months ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- Agentic Pentesting MCP server that discovers, exploits, and reports web application vulnerabilities.☆47Feb 22, 2026Updated last month
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Feb 20, 2026Updated last month
- 🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼☆54Aug 28, 2025Updated 7 months ago
- ☆12Apr 3, 2023Updated 2 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- ☆40Nov 6, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- e2e Scanning research module☆24Updated this week
- Cyber Threat Intelligence☆78Dec 7, 2025Updated 3 months ago
- HTTP Header Analysis Vulnerability Tool☆14May 6, 2022Updated 3 years ago
- HackTheWeb is a production-ready, AI-powered web application penetration testing tool designed for security professionals and ethical hac…☆33Oct 5, 2025Updated 5 months ago
- A collection of awesome penetration testing resources, tools and other shiny things. With repository stars⭐ and forks🍴☆22Updated this week
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 6 months ago
- CVE-2025-3248 Langflow RCE Exploit☆17Jun 17, 2025Updated 9 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆61Apr 13, 2025Updated 11 months ago
- WPF helper library☆14Apr 6, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Just "Harmless" Google dorks for bug hunters☆22Nov 25, 2024Updated last year
- BurpSuite MCP Server: A powerful Model Context Protocol (MCP) server implementation for BurpSuite, providing programmatic access to Burp…☆74Apr 29, 2025Updated 11 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- ☆15Apr 17, 2025Updated 11 months ago
- These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming☆15Feb 24, 2024Updated 2 years ago
- ☆19Jul 9, 2021Updated 4 years ago
- Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation☆38Jul 28, 2025Updated 8 months ago